Index | Title Page | Introduction | Techniques | Challenges | Conclusion | Bibliography |
Next is viruses, viruses is a code that cannot spread on its own and needs to piggy back on other programs. There is a lot of similarities between computer virus and biological viruses. Nevertheless, need a host to live, spread and is not easily spotted without using precautions. Viruses can install back door to the computer for hackers, record key logs to steal passwords or just to delete or tamper data files on the computer/s infected with the virus. So this is important to check for before starting the computer investigations. The destroying or tampering of evidence on a hard drive is very easy and can be hard to track if not monitored and standard operation procedures are not in placed. The destroying of a hard drive can be easy as smashing it, expose it to electromagnetic, and formatting the hard drive. In conclusion, the positive of Computer Forensics investigation outweigh the negatives. It is a great field that benefits everyone. Computer Forensics is the unseen detectives that collect, access, and present evidence and data.